Back propagation learning routine, Computer Engineering

Back propagation Learning Routine - Aartificial intelligence

As with perceptrons, the information in the network is stored in the weights, so the learning problem comes down to the question: how do we train the weights to best categories the training instance. Then we hope that this representation provides a nice way to categories unseen examples.

In outline, the back propagation method is the similar as for perceptrons:

1. We select and fix our architecture for the network, which will include input, hidden and output units, all of which will include sigmoid functions.

2. We randomly assign the weights between all the nodes. The assignments would be to smaller numbers, typically between -0.5 and 0.5.

3. Each training instance is used, 1 after another, to re-train the weights in the network. The way this is done is given in detail below.

4.   After each epoch (run through all the training examples), a termination situation is examine (also detailed below). For this method, Note down that, we are not guaranteed to search weights which give the network the global minimum error, for example, absolutely right categorization of the training examples. Hence the termination condition can have to be in terms of a (possibly small) number of miscategorisations. We see later that this must not be such a fine idea, though.

 

Posted Date: 10/2/2012 6:22:46 AM | Location : United States







Related Discussions:- Back propagation learning routine, Assignment Help, Ask Question on Back propagation learning routine, Get Answer, Expert's Help, Back propagation learning routine Discussions

Write discussion on Back propagation learning routine
Your posts are moderated
Related Questions
Example of Structural hazards - computer architecture: A machine has shared a single-memory pipeline for instructions and data. As a consequence, when an instruction which con

Operand is that part of an instruction which specifies the address of source or result or the data itself on which the processor is to operate. Operand types typically give operand

This branch of AI is concerned with incorporating knowledge from varied disciplines such as biolog neurology psychology mathematics and several linked disciplines. It is typic

A firewall is Software or hardware used to separate a private network from a public network.


Compare zero-, one, two-, and three- address machines by writing programs to compute                         X = (A + B x C)/(D - E x F) for every of the four machines.  Do n

Draw a circuit of TTL gates with Wired-AND connection and explain its operation. Wired - AND Connection In digital IC's NAND and NOR gates are most frequently used. For th

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i

What are the various phases of consumer merchantile model and also differentiate between prepurchase interaction & post purchase interaction.    There are three phase of consumer

Given memory partitions of 100k, 500k, 200k, 300k, and 600k (in order), apply first fit and best fit algorithms to place processes with the space requirement of 212k, 417k, 112k an